National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2008-2939 Detail

Current Description

Cross-site scripting (XSS) vulnerability in proxy_ftp.c in the mod_proxy_ftp module in Apache 2.0.63 and earlier, and mod_proxy_ftp.c in the mod_proxy_ftp module in Apache 2.2.9 and earlier 2.2 versions, allows remote attackers to inject arbitrary web script or HTML via a wildcard in the last directory component in the pathname in an FTP URI.

Source:  MITRE      Last Modified:  08/06/2008      View Analysis Description

Quick Info

CVE Dictionary Entry:
CVE-2008-2939
Original release date:
08/06/2008
Last revised:
09/28/2017
Source:
US-CERT/NIST

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score:
4.3 MEDIUM
Vector:
(AV:N/AC:M/Au:N/C:N/I:P/A:N) (legend)
Impact Subscore:
2.9
Exploitability Subscore:
8.6
CVSS Version 2 Metrics:
Access Vector:
Network exploitable - Victim must voluntarily interact with attack mechanism
Access Complexity:
Medium
Authentication:
Not required to exploit
Impact Type:
Allows unauthorized modification

Vendor Statements (disclaimer)

Official Statement from Red Hat (11/12/2008)

These issue was addressed in all affected httpd versions as shipped in Red Hat Enterprise Linux 3, 4, and 5 were fixed via: https://rhn.redhat.com/errata/RHSA-2008-0967.html This issue is tracked via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2008-2939 The Red Hat Security Response Team has rated this issue as having low security impact, future updates may address this flaw in other affected products (such as Red Hat Application Stack).

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource Type Source Name
http://lists.apple.com/archives/security-announce/2009/May/msg00002.html External Source APPLE APPLE-SA-2009-05-12
http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00000.html External Source SUSE SUSE-SR:2008:024
http://marc.info/?l=bugtraq&m=123376588623823&w=2 External Source HP HPSBUX02401
http://marc.info/?l=bugtraq&m=125631037611762&w=2 External Source HP HPSBUX02465
http://rhn.redhat.com/errata/RHSA-2008-0967.html External Source REDHAT RHSA-2008:0967
http://sunsolve.sun.com/search/document.do?assetkey=1-26-247666-1 External Source SUNALERT 247666
http://support.apple.com/kb/HT3549 External Source CONFIRM http://support.apple.com/kb/HT3549
http://svn.apache.org/viewvc?view=rev&revision=682868 External Source CONFIRM http://svn.apache.org/viewvc?view=rev&revision=682868
http://svn.apache.org/viewvc?view=rev&revision=682870 External Source CONFIRM http://svn.apache.org/viewvc?view=rev&revision=682870
http://svn.apache.org/viewvc?view=rev&revision=682871 External Source CONFIRM http://svn.apache.org/viewvc?view=rev&revision=682871
http://wiki.rpath.com/Advisories:rPSA-2008-0327 External Source CONFIRM http://wiki.rpath.com/Advisories:rPSA-2008-0327
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0328 External Source CONFIRM http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0328
http://www.kb.cert.org/vuls/id/663763 US Government Resource External Source CERT-VN VU#663763
http://www.mandriva.com/security/advisories?name=MDVSA-2008:194 External Source MANDRIVA MDVSA-2008:194
http://www.mandriva.com/security/advisories?name=MDVSA-2008:195 External Source MANDRIVA MDVSA-2008:195
http://www.mandriva.com/security/advisories?name=MDVSA-2009:124 External Source MANDRIVA MDVSA-2009:124
http://www.rapid7.com/advisories/R7-0033 External Source MISC http://www.rapid7.com/advisories/R7-0033
http://www.redhat.com/support/errata/RHSA-2008-0966.html External Source REDHAT RHSA-2008:0966
http://www.securityfocus.com/archive/1/archive/1/495180/100/0/threaded External Source BUGTRAQ 20080806 Apache HTTP Server mod_proxy_ftp Wildcard Characters Cross-Site Scripting
http://www.securityfocus.com/archive/1/archive/1/498566/100/0/threaded External Source BUGTRAQ 20081122 rPSA-2008-0327-1 httpd mod_ssl
http://www.securityfocus.com/archive/1/archive/1/498567/100/0/threaded External Source BUGTRAQ 20081122 rPSA-2008-0328-1 httpd mod_ssl
http://www.securityfocus.com/bid/30560 External Source BID 30560
http://www.securitytracker.com/id?1020635 External Source SECTRACK 1020635
http://www.ubuntu.com/usn/USN-731-1 External Source UBUNTU USN-731-1
http://www.us-cert.gov/cas/techalerts/TA09-133A.html US Government Resource External Source CERT TA09-133A
http://www.vupen.com/english/advisories/2008/2315 External Source VUPEN ADV-2008-2315
http://www.vupen.com/english/advisories/2008/2461 External Source VUPEN ADV-2008-2461
http://www.vupen.com/english/advisories/2009/0320 External Source VUPEN ADV-2009-0320
http://www.vupen.com/english/advisories/2009/1297 External Source VUPEN ADV-2009-1297
http://www-1.ibm.com/support/docview.wss?uid=swg1PK70197 External Source AIXAPAR PK70197
http://www-1.ibm.com/support/docview.wss?uid=swg1PK70937 External Source AIXAPAR PK70937
https://exchange.xforce.ibmcloud.com/vulnerabilities/44223 External Source XF apache-modproxyftp-xss(44223)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11316 External Source OVAL oval:org.mitre.oval:def:11316
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7716 External Source OVAL oval:org.mitre.oval:def:7716

References to Check Content

Identifier:
oval:org.mitre.oval:def:11316
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:11316
Identifier:
oval:org.mitre.oval:def:7716
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:7716

Technical Details

Vulnerability Type (View All)

  • Cross-Site Scripting (XSS) (CWE-79)

Change History 5 change records found - show changes